Lavasoft Malware Labs Blog

Secure Your PC

Ad-Aware 11’s release is just around the corner. We’re really excited to finally make it available to everyone in the next few days.

Ad-Aware has come a long way since its origins as a simple adware remover. These days, Ad-Aware is a full strength anti-malware program with multiple awards and certifications under its belt, from the most rigorous testing labs to internationally available periodicals like PC Mag.


The system registry is a database of essential file references to applications and utilities. Its structure is hierarchical. The registry is structured with nodes of information that contain keys and sub-keys.

To access the System Registry is quite easy.

 Do not make any changes until you have done a backup of the Registry. If any incorrect change, you may not boot your OS.


When it comes to securing your PC, be sure to enable a firewall. A firewall is used to prevent unwanted connections being made to your PC. Malware, such a worms, can scan a machine to see if certain ports are open and if so will attempt to access your machine via those open ports.


Windows comes pre-installed with a basic firewall and while you can’t configure it too much, it’s certainly worthwhile making sure that it’s enabled.


Microsoft periodically release security updates for Windows. These security updates fix recently discovered security flaws. As you would expect, it’s a good idea to install the latest security fixes as soon as they become available.


Temporary Internet Files is a folder on Microsoft Windows which contains Web page content that is stored on your hard disk. Internet Explorer and other web browsers uses this directory to cache pages and other multimedia content, such as video and audio files, from websites you visit. This feature improves network performance allowing such websites to load more quickly the next time you visit them.

To clean the Temporary Internet Files folder, proceed through the steps listed below:


ActiveX controls called add-ons are small programs which are used on the Internet. They can enhance your browsing experience by allowing animation or they can help with tasks such as installing security updates at Microsoft Update.


The Task Manager provides detailed information about computer performance and running applications, processes and CPU usage, commit charge and memory information, network activity and statistics, logged-in users, and system services.

You can use the Task Manager to end a process.

To open the Task Manager, do one of the following:

  • right-click the taskbar and then click Task Manager

– or –


Malware Removal Support Blog is now enabled.